Catalog Search Results
Description
Common returns to his hometown of Chicago - a city on fire in the aftermath of the brutal police killing of teenager Laquan McDonald. With thousands of people in the streets, Chicago has become the epicenter of national debates around police violence, racism and accountability. Working with community activists and whistleblowers, Common discovers a decades-long pattern of police corruption and sophisticated cover-ups that stretch all the way to the...
Description
"Let us place there, carved high, as close to heaven as we can, the words of our leaders, their faces, to show posterity what manner of men they were. Then breathe a prayer that these records will endure until the wind and the rain alone shall wear them away." - Gutzon Borglum, Sculptor of Mount Rushmore. Towering above the Black Hills of South Dakota stands America's most treasured monument...a crowning testament to the great leaders who symbolize...
Description
The construction of Mount Rushmore was looked upon unfavorably by Native Americans who were promised the Black Hills in a treaty later broken by the United States. In order to honor the legacy of the Native Americans who lived in western South Dakota, an even larger monument of Crazy Horse is currently under construction..
Description
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
Description
Because our privacy laws are so far behind today’s technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
Description
The government and private industries are using a vast cache of information about each of us: our travel patterns, our web browsing habits, our purchasing preferences, and more. Efforts to decide upon and enact laws and policies trail behind new developments in technology, and this lecture examines the potential inherent in such deep and widespread data—as well as the threat it poses to privacy and anonymity.
Description
For all the talk about national intelligence programs, local police probably gather more surveillance data than any other governmental entity. Find out what techniques cops use to solve crimes, from closed-circuit cameras to license plate readers, and explore how the NYPD has put all the pieces together.
Description
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption—including biometric finger scans to unlock phones and access data. But without a "back door"for government access, the intelligence community argues, national security is at risk. Unpack the tension from a Fifth Amendment perspective.
Description
A man shoots down a drone that is flying over his private property. A retail store uses predictive data analytics to send pregnancy-related advertising to a teenager who has not told her parents about her condition. A police officer places a GPS device on a suspected criminal's car to follow him and build a case against him..The news is full of such stories, in which new technologies lead to dilemmas that could not have been imagined just a few decades...
Description
What if you could harness the power of the free market to solve the problems of poverty, hunger, and inequality? To some, it sounds impossible. But Nobel Peace Prize winner Muhammad Yunus is doing exactly that.Bonsai People celebrates Yunus’ extraordinary humanitarian work, which started by lending [dollar sign]27 to 42 people out of his own pocket and has now grown to helping 1 out of every 1,000 people on earth. But he didn’t stop there - whenever...
Description
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used? What are the responsibilities of the data collectors?
Description
It has been fifty years since the adventures of Juan Salvo were first published in the science fiction comic El Eternauta. Some time in 1957, Argentine writer Héctor Germán Oesterheld created a highly metaphorical and political graphic novel. El Eternauta introduced a new way of understanding comic strips: it transcended the limits of mere escapism to become an adult and politically committed story. And to this day, the comic book continues to surprise...
Description
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance—physical, electronic and data—and see how each type works. Case studies of the Osama Bin Laden raid and U.S. airport screening show the tension between security and transparency.
20) From Poverty to Purpose, The Ben Carson Story: Role Model for Medicine & World-Renowned Neurosurgeon
Description
How does an inner city African American kid with a self-proclaimed violent temper, become a world renowned brain surgeon, an inspiring role model for disadvantaged youth, a medical innovator and achieve success... against all odds? In 2001, CNN and Time Magazine named Ben Carson one of the nation's 20 foremost physicians and scientists. His mother was his most influential inspiration, changing Ben from worst to first. He gained respect as he soared...
In Interlibrary Loan
Didn't find what you need? Items not owned by Ajax Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request